Analyzing Security Threats
Offered By: Udacity
Course Description
Overview
In this course, you’ll start by exploring the current threat landscape and identifying both threats and threat actors that organizations face. You will learn about the OWASP Top 10 and that they pose a critical threat to organizations. Then, you’ll learn all of the ways to mitigate threats, including the OWASP Top 10. Lastly, you’ll learn what threat modeling is and build your own threat models.
Syllabus
- Introduction to Analyzing Threats
- In this lesson, you'll be introduced to what you'll be learning about in this course!
- Identifying Security Threats
- In this lesson, you will learn about internal threats, external threats, and the OWASP Top 10.
- Mitigating Threats
- In this lesson, you will learn different mitigation strategies and the threats they mitigate.
- Threat Modeling
- In this lesson, you will use your new skills to create Threat Models for different threat scenarios.
- Project: Insecure Juice Shop
- In this lesson, you will work with a large company to assess threats and suggest mitigations.
Taught by
Milind Adari
Related Courses
Learning the OWASP Top 10LinkedIn Learning OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals
EC-Council via FutureLearn Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Udemy OWASP Top 10: API Security Playbook
Pluralsight